WO2014120218A1 - Determining transferability of a computing resource to a cloud computing environment - Google Patents

Determining transferability of a computing resource to a cloud computing environment Download PDF

Info

Publication number
WO2014120218A1
WO2014120218A1 PCT/US2013/024200 US2013024200W WO2014120218A1 WO 2014120218 A1 WO2014120218 A1 WO 2014120218A1 US 2013024200 W US2013024200 W US 2013024200W WO 2014120218 A1 WO2014120218 A1 WO 2014120218A1
Authority
WO
WIPO (PCT)
Prior art keywords
computing environment
cloud computing
application
dimension
processor
Prior art date
Application number
PCT/US2013/024200
Other languages
French (fr)
Inventor
Jacques Tessier
Darren E. BRUST
Sandro Joseph DEL-RE
Peter M. GAINES
Jambey CLINKSCALES
Jack E. STRUKEL
Chadd A. SCHWARTZ
Kevin Morgan
Original Assignee
Hewlett-Packard Development Company, L.P.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett-Packard Development Company, L.P. filed Critical Hewlett-Packard Development Company, L.P.
Priority to US14/764,973 priority Critical patent/US10728322B2/en
Priority to JP2015555978A priority patent/JP6214679B2/en
Priority to CN201380074165.7A priority patent/CN105229598B/en
Priority to PCT/US2013/024200 priority patent/WO2014120218A1/en
Priority to EP13873960.2A priority patent/EP2951679A4/en
Publication of WO2014120218A1 publication Critical patent/WO2014120218A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation

Definitions

  • the present technique relates generally to transferring computing resources to a cloud computing environment. Specifically, the present technique relates to determining transferability of computing resources to the cloud computing environment.
  • Some computing devices communicate via a network of computing resources including servers, host computing devices, storage devices, applications, and the like.
  • a cloud computing environment provides remote services including software, data, computation, and the like, to a client computing device. Rather than performing all services locally on the client computing device or on a private server, some users may benefit from relocating computing resources to the cloud computing environment.
  • FIG. 1 is a block diagram illustrating a system including a computing device having analysis logic to determine transferability of computing resources to a cloud computing environment;
  • FIG. 2 is a block diagram illustrating the analysis logic
  • Fig. 3 is a dimension table illustrating business dimensions including factors related to characteristics of the computing resource
  • Fig. 4 is a dimension table illustrating technical dimensions including factors related to characteristics of the computing resource
  • FIG. 5 is a diagram illustrating layers that relate to the types of computing environments;
  • Fig. 6 is a diagram illustrating how close the received data along each business dimension is to a computing environment layer;
  • Fig. 7 is a diagram illustrating how close the received data along each technical dimension is to a computing environment layer
  • FIG. 8 is a block diagram illustrating a method 800 for generating a report related to the transferability of a computing resource to a cloud computing environment.
  • Fig. 9 is a block diagram showing a tangible, machine-readable medium that stores code adapted to determine the transferability of a computing resource to a cloud computing environment.
  • the techniques disclosed herein relate generally to analyzing transferability of a computing resource to a cloud computing environment.
  • the transferability of computing resources to the cloud computing environment may be evaluated based on dimensions related to a business of the user and dimensions related to technology detail of computing resources of the user.
  • Fig. 1 is a block diagram illustrating a system 100 including a computing device 102 having analysis logic 104 to determine transferability of computing resources to a cloud computing environment.
  • the computing device 102 may be, for example, a laptop computer, desktop computer, tablet computer, mobile device, server, or cellular phone, a wearable computing device, among others.
  • the computing device 104 may include a processor 106 and a storage device 108.
  • the processor 1 06 can be a single core processor, a multi-core processor, a computing cluster, or any number of other
  • the processor 106 may be implemented as Complex Instruction Set Computer (CISC) or Reduced Instruction Set Computer (RISC) processors, x86 Instruction set compatible processors, multi-core, or any other suitable processors.
  • CISC Complex Instruction Set Computer
  • RISC Reduced Instruction Set Computer
  • x86 Instruction set compatible processors multi-core, or any other suitable processors.
  • the main processor 1 06 includes dual-core processor(s), dual-core mobile processor(s), or the like.
  • the computing device 102 may include a memory device 1 1 0.
  • the memory device 1 10 can include random access memory (e.g., SRAM, DRAM, zero capacitor RAM, SONOS, eDRAM, EDO RAM, DDR RAM, RRAM, PRAM, etc.), read only memory (e.g., Mask ROM, PROM, EPROM, EEPROM, etc.), flash memory, or any other suitable memory systems.
  • random access memory e.g., SRAM, DRAM, zero capacitor RAM, SONOS, eDRAM, EDO RAM, DDR RAM, RRAM, PRAM, etc.
  • read only memory e.g., Mask ROM, PROM, EPROM, EEPROM, etc.
  • flash memory or any other suitable memory systems.
  • the processor 106 may be connected through a system bus 1 20 (e.g., PCI, ISA, PCI-Express, HyperTransport®, NuBus, etc.) to a display interface 1 12 adapted to connect the computing device 102 to a display device 1 14.
  • the display device 1 14 may include a display screen that is a built-in component of the computing device 102.
  • the display device 1 14 may also include a computer monitor, television, or projector, among others, that is externally connected to the computing device 102.
  • the storage device 108 may be a non-transitory computer-readable medium.
  • the storage device 1 08 may have instructions stored thereon that when executed by the processor 106 cause the computing device 102 to perform operations.
  • the operations may be executed by logic at least partially comprising hardware logic.
  • Hardware logic at least partially includes hardware and may also include software or firmware.
  • Hardware logic may include electronic hardware including interconnected electronic components to perform logic operations on the computing device 1 02.
  • Electronic hardware may include individual chips/circuits and distributed information processing systems.
  • the storage device 108 may include dimensions related to the transferability of a computing resource to a cloud computing environment.
  • the dimensions may be determined by an operator of the system 1 00.
  • the dimensions are concepts that are related to the transferability of the computing resource to a cloud computing environment.
  • Each of the dimensions may include factors related to transferability that may be evaluated with respect to a specific computing resource.
  • the dimensions may be stored on storage device 108 in one or more dimension tables 105 including the factors.
  • the operations may include receiving data related to characteristics of the application. In some embodiments, the data may be received via input from the user of the system 100.
  • the operations may include comparing the data received to the dimensions to determine a comparison value indicating how close the data is to the dimension.
  • the operations may include generating one or more reports 1 07 based on the comparison. The comparison and the report generation may be carried out by the analysis logic 104 and the report 107 may be stored on the storage device 108.
  • the dimensions may be determined by an operator of the system 100.
  • the dimensions may belong to a category including a business category or a technical category.
  • the business category includes dimensions related to business-related factors that may enable or prevent the transfer of a computing resource to a cloud computing environment.
  • the technical category includes dimensions related to the technical characteristics of the application or of the user.
  • the operator of the system 100 may
  • a "computing resource,” as referred to herein, is any component used to carry out computation, communication, and the like.
  • a computing resource may be data storage capacity, processing resources, software applications, and the like.
  • the dimensions of either the technical category or the business category may include factors related to the characteristics of the computing resource.
  • Fig. 2 is a block diagram illustrating the analysis logic 1 04.
  • the analysis logic 1 04 may include a data input module 202, a comparison engine 204, a weighting module 206, normalization module 208, a risk analysis module 210, and a reporting module 212.
  • the data input module 202 is configured to receive data, including the factors discussed above, related to the characteristics of the computing resource.
  • the data input module 202 may gather data via a graphical user interface of rendered on a display device, such as the display device 1 14 of Fig. 1 .
  • the data may be gathered in the form of a questionnaire including questions associated the factors, as discussed below in regard to Figs. 3 and Figs. 4.
  • the comparison engine 204 is configured to compare the data received to an associated dimension to determine a comparison value.
  • a comparison value may reflect how close the received data is to the dimensions.
  • the comparison value may be a percentage. If the received data reflects that every factor of a given dimension has been met, the comparison value may be 100%, for example. In some cases, the comparison value may be less than 100% depending on how many of the questions for any given dimension are answered in the affirmative.
  • the comparison engine 204 may be configured to determine a type of computing environment for which the computing resource is most suitable based on how close the received data is to the dimensions. Determining the type of computing environment may include selecting the type from a group.
  • the group of cloud computing environments may include a public cloud computing environment, a private off-premise cloud computing environment, a private on-premise cloud computing environment, and a dedicated computing environment.
  • a public could computing environment, as referred to herein, is a cloud computing environment where the computing resources, such as applications, storage devices, and the like, are made available to the general public by a service provider.
  • a private-off premise computing environment is a cloud computing environment is a cloud environment, located remotely from the geographic location of the user that is operated solely for a single organization or user.
  • a private on-premise computing environment is a cloud computing environment located at the geographic location of the user.
  • a dedicated computing environment is a computing environment that includes computing resources such as a server, which is leased, or owned, exclusively by a user of the computing resources.
  • the weighting module 206 is configured to weight the data received based on input from a user.
  • the data may include factors from a regulatory dimension of the business category.
  • the weighting module 206 is configured to enable the user to weight some factors heavier than others.
  • the weighting module 206 may weight some regulatory dimensions factors that indicate issues with running an application on a public cloud computing environment heavier than factors that are related to whether the application may be more suitable to run on the private cloud computing environment or the dedicated computing environment.
  • the normalization module 208 is configured to normalize the comparison value based on a minimum value required for each dimension in relation to the type of cloud computing environment determined.
  • a minimum value may be predetermined by an operator of the system 100.
  • the comparison value for the infrastructure dimension may be required to be at least 75% for a public cloud computing environment.
  • the comparison value for the cloud operating model may be required to be at least 90% for a public cloud computing environment. Therefore, in this example, a comparison value of 75% for the infrastructure dimension may be normalized with a comparison value of 90% for the cloud operating model dimension.
  • the risk analysis module 210 is configured to identify a risk value associated with the transferability of the application to the cloud computing environment.
  • the risk value is identified based on a subset of values associated with the received data.
  • the analysis logic 104 may direct the processor 106 to provide a risk mitigation recommendation based on the risk value.
  • each of the factors of the dimensions discussed above may be associated with a risk value indicating the risk for transferring a computing resource to a cloud computing environment.
  • the risk values associated with each factor may be provided in the generated report.
  • the risk values may be averaged and associated with an average risk value of low, medium, high.
  • the generated report may also include recommendations related to mitigation of the risk indicated by the risk value.
  • the reporting module 212 is configured to generate a report based on the data received.
  • the generated report may include diagrams and textual explanation related to the transferability of a computing resource to a cloud computing environment.
  • the report generated may include spider diagrams, as illustrated below in Figs. 5 to 7.
  • the report generated may also include a recommendation for a type of computing environment for which transfer of the computing resource is suitable.
  • Fig. 3 is a dimension table 300 illustrating business dimensions 302 including factors 304 related to characteristics of the computing resource.
  • the dimensions 302 in the dimension table 300 are dimensions of a business category 306.
  • the dimensions of the business category 306 may include regulatory 308, vendor support 310, geography 312, service availability 314, workload variability 31 6, and security 318.
  • Each of the business category 306 dimensions 302 includes factors 304 related to whether the user's business is compatible for transferring computing resources to the cloud computing environment.
  • the regulatory dimension 308 includes factors 304 related to whether there are regulatory issues that may prevent a computing resource from being executed in a cloud computing environment.
  • the factors 304 of the regulatory dimension may include whether an application is subject to regulatory requirements such as FISMA, HIPPA, and the like, or other regulations that may require the application to run on a government certified operating system image.
  • Computing resources that are identified as having regulatory factors that are prohibitive to running on a public cloud computing environment may be more suitable for a private cloud computing environment or a dedicated computing environment.
  • the vendor support dimension 31 0 includes the factors 304 related to whether a vendor of any of a computing resource supports an instance of the computer resource in the cloud computing environment. For example, an application may be required to operate on a vendor certified operating system image.
  • the geography dimension 312 includes the factors 304 related to whether there are any issues relating to geography that prevent a computing resource from transferring to a cloud computing environment.
  • the geographic location of a user base may be a factor of the geography dimension when determining the transferability of a computing resource to the cloud computing environment.
  • the service availability dimension 314 includes the factors 304 related to whether a computing resource has a required service level, has an ability to automatically restart upon failure. For example, if a computing resource, such as an application, has an inability to automatically restart upon failure, the application may be best suited for a private cloud computing environment that may enable a user to restart the application.
  • the workload variability dimension 316 includes factors 304 related to whether the user's workload variability is well-suited for a cloud computing environment. For example, there may be unpredictable workloads associated with the computing resource. Unpredictable workloads, including peaks of usage may be a factor in the functionality of the computing resource in a cloud computing environment.
  • the security dimension 318 includes the factors 304 related to whether the computing resources include security restraints. For example, if a computing resource, such as an application, has security restraints that prohibit the use of the computing resource in a public cloud computing environment, the application may be best suited for a private cloud computing environment. As another example, an application may require a certain level of encryption not available in a public cloud computing environment.
  • Fig. 4 is a dimension table 400 illustrating technical dimensions 402 including factors 404_related to characteristics of the computing resource.
  • the dimensions 402 in the dimension table 400 are dimensions of a technical category 406.
  • the dimensions of the technical category 406 may include infrastructure compatibility 408, cloud computing model 41 0, internet stability 41 2, performance 414, architecture 416, and interfaces 41 8.
  • the infrastructure compatibility dimension 408 includes the factors 404 related to whether the computing resources are compatible with an infrastructure of a cloud computing environment.
  • the factors of the infrastructure compatibility dimension may include, for example, licensing restrictions, physical hardware dependencies, legacy operating system dependencies, and the like.
  • the cloud computing model dimension 41 0 includes the factors 404 related to whether the computing resources are compatible with a cloud computing environment.
  • the factors 404 of the cloud computing model dimension 41 0 may include whether the computing resource, such as an application, requires any customization of a cloud computing operating system to support the application.
  • the factors 404 of the cloud computing model dimension 410 may include whether the computing resource, such as an application, utilizes proprietary clustering technology.
  • the internet stability dimension 412 includes the factors 404 related to whether the computing resources are suitable for a cloud computing
  • the factors 404 of the internet stability dimension 412 may include whether the level of performance of standard internet connectivity is sufficient for an application, or whether the application uses standard internet protocols. As another example, the factors 404 of the internet stability dimension 412 may include the level of reliability that may be required for an application, or whether the level of security associated with standard internet connectivity, such as HTTPS, will be sufficient for an application.
  • the performance dimension 414 includes the factors 404 related to whether the computing resources are compatible in terms of bandwidth and latency.
  • the factors 404 of the performance dimension may include a required data bandwidth associated with a computing resource, or an acceptable level of data latency.
  • the architecture dimension 41 6 includes the factors 404 related to whether the computing resources are suitable for a cloud computing
  • the factors 404 of the architecture dimension 416 may include whether a computing resource benefits from parallel processing, the communication architecture, whether the computing resource can scale horizontally or vertically, whether the computing resource is considered contextual or core, and the like.
  • Other examples of the factors 404 of the architecture dimension 416 may include whether a computing resource, such as an application, relies on any services or components that are written in legacy software technologies or languages and whether the application is based on modern software technologies and languages.
  • the interfaces dimension 41 8 includes the factors 404 related to whether the computing resources have any issues that would prevent the computing resources to be transferred to a cloud computing environment.
  • the factors 404 of the interfaces dimension 418 may include whether the computing resource has related communication, data, and interface protocols that are well defined and documented.
  • Data describing the characteristics of the computing resource may be received for each of the factors 404.
  • the data may be received via a questionnaire filled in by the user.
  • the questionnaire may be displayed on a graphical user interface of a display device, such as the display device 1 14 of Fig. 1 .
  • the data may be received by analysis logic, such as the analysis logic 1 04 of Fig. 1 , and the analysis logic may carry out the operations as described above including determining how close the received data is to the dimensions of each category, and generating a report describing the analysis performed by the analysis logic 1 04.
  • Fig. 5 is a diagram 500 illustrating layers that relate to types of computing environments.
  • the diagram 500 may include vertices 502, 504, 506, 508, 51 0, and 512, wherein each vertex may be associated with a dimension of either the business category or the technical category.
  • the diagram 500 may include layers 514, 516, 518, 520, wherein a layer may be associated with a type of computing environment.
  • the layer 514 may be associated with the dedicated computing environment.
  • the layer 51 6 may be associated with the private on-premise cloud computing environment.
  • the layer 51 8 may be associated with the private off-premise computing environment.
  • the layer 520 may be associated with a public cloud computing environment.
  • Fig. 6 is a diagram 600 illustrating how close the received data along each business dimension is to a computing environment layer.
  • the business category includes six dimensions: regulatory 308, vendor support 310, geography 312, service availability 314, workload variability 31 6, and security 318.
  • An area, as indicated by 602 may be associated with the characteristics of the application for which the data is received.
  • the extent to which the area 602 covers a particular layer of the diagram 600 indicates the transferability of the corresponding computing resource to the particular type of computing system represented by the layer.
  • the diagram 600 illustrates the data received indicates a close-fit in relation to the regulatory dimension 308, the vendor support dimension 31 0, the geography dimension 312, and the security dimension 318 for a public cloud computing environment associated with the layer 520.
  • the diagram 600 also illustrates a poor fit for a private off-premise cloud computing environment associated with the layer 518, for the service availability dimension 314 and the workload variability dimension 316. Additionally, although not shown on the diagram 600, the data received in this example illustrates that the data received indicates a good fit for all dimensions of the business category including the private on-premise cloud computing environment, and the dedicated computing environment, respectively associated with the layers 516 and 514 of Fig. 5.
  • Fig. 7 is a diagram 700 illustrating how close the received data along each technical dimension is to a computing environment layer.
  • the technical category 406 includes six dimensions: infrastructure compatibility 408, cloud operating model 410, internet suitability 41 2, performance 414, architecture 416, and interfaces 41 8.
  • An area, as indicated by 602, may be associated with the characteristics of the application for which the data is received.
  • the diagram 700 illustrates the data received indicates a close-fit for some of the dimensions as the area 602 fills some of the dimensions of the diagram 700.
  • the diagram 700 illustrates the data received indicates a close-fit in relation to the infrastructure compatibility dimension 408 and the interfaces dimension 418 for a public cloud computing environment associated with the layer 520.
  • the diagram 700 also illustrates a poor fit for a private off-premise cloud computing environment associated with the layer 518, for the performance dimension 414 and the architecture dimension 416. Additionally, although not shown on the diagram 600, the data received in this example illustrates that the data received indicates a good fit for all dimensions of the technical category including the private on-premise cloud computing environment, and the dedicated computing environment, respectively associated with the layers 516 and 514 of Fig. 5.
  • Fig. 8 is a block diagram illustrating a method 800 for generating a report related to the transferability of a computing resource to a cloud computing environment.
  • the method 800 may include receiving, at block 802, data related to characteristics of the application.
  • the method 800 may include comparing, at block 804, via a processor, the data received to predetermined dimensions related to the transferability of the computing resource to a cloud computing environment to determine a comparison value indicating how close the data is to each dimension.
  • the method 800 may include generating, at block 806, via the processor, a report based on the comparison.
  • the dimensions comprise factors related to the characteristics of the application.
  • one of the dimensions may be related to the security requirements of the application.
  • One factor of the security dimension may be whether the application requires data encryption.
  • the data received may be weighted.
  • the method 800 may include weighting the data received based on input from a user.
  • generating the report, at block 808, may include determining a type of computing environment for which transfer of an application is suitable.
  • determining the type of computing environment includes selecting the type from a group.
  • the group may include a public cloud computing environment, a private off-premise cloud computing environment, a private on-premise cloud computing environment; and a dedicated computing environment.
  • the method 800 may include normalizing the comparison value based on a minimum value required for each dimension in relation to the type of cloud computing environment determined.
  • the comparison value for the infrastructure dimension may be required to be at least 75% for a public cloud computing environment.
  • the comparison value for the infrastructure dimension may be required to be at least 75% for a public cloud computing environment.
  • comparison value for the cloud operating model may be required to be at least 90% for a public cloud computing environment. Therefore, the method 800 may include normalizing the data based on the minimum values.
  • the method 800 may include determining categories including at least some of the dimensions, the categories including a business category comprising dimensions related to business characteristics of a user.
  • the method 800 may include determining categories including at least some of the dimensions, the categories including a technical category comprising dimensions related to the technical characteristics of the application or of a user.
  • the method 800 may include transferring the application to the cloud based on the report.
  • transferring the application to the cloud computing environment may include installing servers to host the application.
  • the method 800 may include identifying a risk value associated with the transferability of the application to the cloud computing environment, wherein the risk value is identified based on a subset of values associated with the factors. In this embodiment, the method 800 may include providing a risk mitigation recommendation in the report generated based on the risk value.
  • Fig. 9 is a block diagram showing a tangible, non-transitory, computer-readable medium that stores code adapted to determine the transferability of a computing resource to a cloud computing environment.
  • the computer-readable medium is generally referred to by the reference number 900.
  • the computer-readable medium 900 can comprise Random Access Memory (RAM), a hard disk drive, an array of hard disk drives, an optical drive, an array of optical drives, a non-volatile memory, a Universal Serial Bus (USB) flash drive, a DVD, a CD, and the like.
  • RAM Random Access Memory
  • USB Universal Serial Bus
  • the computer-readable medium 900 can be accessed by a processor 902 over a computer bus 904.
  • a first block 906 can include a data input module to receive data related to the characteristics of the computing resource.
  • a second block 908 can include a comparison engine configured to compare the data received to a predetermined dimension related to the transferability of an application to a cloud computing environment to determine a comparison value.
  • a third block 91 0 can include a weighting module configured to weight the data received based on input from a user.
  • a fourth block 912 can include a normalization module 208 configured to normalize the comparison value based on a minimum value required for each dimension in relation to the type of cloud computing environment determined.
  • a fifth block 914 can include a risk analysis module 21 0 is configured to identify a risk value associated with the transferability of the application to the cloud computing environment.
  • a sixth block 91 6 can include a reporting module configured to generate a report based on the data received.
  • the software components can be stored in any order or configuration.
  • the computer-readable medium 400 is a hard drive
  • the software components can be stored in noncontiguous, or even overlapping, sectors.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Information Transfer Between Computers (AREA)
  • Debugging And Monitoring (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Stored Programmes (AREA)

Abstract

An embodiment of the present technique may in a method for generating a report related to the transferability of an application to a cloud computing environment. The method may include receiving data related to characteristics of the application. The method may include comparing, via a processor, the data received to predetermined dimensions related to the transferability of an application to a cloud computing environment to determine a comparison value indicating how close the data is to each dimension. The method may include generating, via the processor, a report based on the comparison.

Description

DETERMINING TRANSFERABILITY OF A COMPUTING RESOURCE TO A CLOUD COMPUTING ENVIRONMENT
TECHNICAL FIELD
[0001] The present technique relates generally to transferring computing resources to a cloud computing environment. Specifically, the present technique relates to determining transferability of computing resources to the cloud computing environment.
BACKGROUND
[0002] Some computing devices communicate via a network of computing resources including servers, host computing devices, storage devices, applications, and the like. A cloud computing environment provides remote services including software, data, computation, and the like, to a client computing device. Rather than performing all services locally on the client computing device or on a private server, some users may benefit from relocating computing resources to the cloud computing environment.
BRIEF DESCRIPTION OF THE DRAWINGS
[0003] Certain embodiments are described in the following detailed description and in reference to the drawings, in which:
[0004] Fig. 1 is a block diagram illustrating a system including a computing device having analysis logic to determine transferability of computing resources to a cloud computing environment;
[0005] Fig. 2 is a block diagram illustrating the analysis logic;
[0006] Fig. 3 is a dimension table illustrating business dimensions including factors related to characteristics of the computing resource;
[0007] Fig. 4 is a dimension table illustrating technical dimensions including factors related to characteristics of the computing resource;
[0008] Fig. 5 is a diagram illustrating layers that relate to the types of computing environments; [0009] Fig. 6 is a diagram illustrating how close the received data along each business dimension is to a computing environment layer;
[0010] Fig. 7 is a diagram illustrating how close the received data along each technical dimension is to a computing environment layer;
[0011] Fig. 8 is a block diagram illustrating a method 800 for generating a report related to the transferability of a computing resource to a cloud computing environment; and
[0012] Fig. 9 is a block diagram showing a tangible, machine-readable medium that stores code adapted to determine the transferability of a computing resource to a cloud computing environment.
DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS
[0013] The techniques disclosed herein relate generally to analyzing transferability of a computing resource to a cloud computing environment.
There are many factors to consider when a user is deciding whether to transfer their computing resources such as computing programs, computing
applications, databases, and the like, to a cloud computing environment. The transferability of computing resources to the cloud computing environment may be evaluated based on dimensions related to a business of the user and dimensions related to technology detail of computing resources of the user.
[0014] Fig. 1 is a block diagram illustrating a system 100 including a computing device 102 having analysis logic 104 to determine transferability of computing resources to a cloud computing environment. The computing device 102 may be, for example, a laptop computer, desktop computer, tablet computer, mobile device, server, or cellular phone, a wearable computing device, among others. The computing device 104 may include a processor 106 and a storage device 108. The processor 1 06 can be a single core processor, a multi-core processor, a computing cluster, or any number of other
configurations. The processor 106 may be implemented as Complex Instruction Set Computer (CISC) or Reduced Instruction Set Computer (RISC) processors, x86 Instruction set compatible processors, multi-core, or any other
microprocessor or central processing unit (CPU). In some embodiments, the main processor 1 06 includes dual-core processor(s), dual-core mobile processor(s), or the like.
[0015] The computing device 102 may include a memory device 1 1 0. The memory device 1 10 can include random access memory (e.g., SRAM, DRAM, zero capacitor RAM, SONOS, eDRAM, EDO RAM, DDR RAM, RRAM, PRAM, etc.), read only memory (e.g., Mask ROM, PROM, EPROM, EEPROM, etc.), flash memory, or any other suitable memory systems.
[0016] The processor 106 may be connected through a system bus 1 20 (e.g., PCI, ISA, PCI-Express, HyperTransport®, NuBus, etc.) to a display interface 1 12 adapted to connect the computing device 102 to a display device 1 14. The display device 1 14 may include a display screen that is a built-in component of the computing device 102. The display device 1 14 may also include a computer monitor, television, or projector, among others, that is externally connected to the computing device 102.
[0017] The storage device 108 may be a non-transitory computer-readable medium. The storage device 1 08 may have instructions stored thereon that when executed by the processor 106 cause the computing device 102 to perform operations. The operations may be executed by logic at least partially comprising hardware logic. Hardware logic at least partially includes hardware and may also include software or firmware. Hardware logic may include electronic hardware including interconnected electronic components to perform logic operations on the computing device 1 02. Electronic hardware may include individual chips/circuits and distributed information processing systems.
[0018] The storage device 108 may include dimensions related to the transferability of a computing resource to a cloud computing environment. In some embodiments, the dimensions may be determined by an operator of the system 1 00. The dimensions are concepts that are related to the transferability of the computing resource to a cloud computing environment. Each of the dimensions may include factors related to transferability that may be evaluated with respect to a specific computing resource. The dimensions may be stored on storage device 108 in one or more dimension tables 105 including the factors. The operations may include receiving data related to characteristics of the application. In some embodiments, the data may be received via input from the user of the system 100. The operations may include comparing the data received to the dimensions to determine a comparison value indicating how close the data is to the dimension. The operations may include generating one or more reports 1 07 based on the comparison. The comparison and the report generation may be carried out by the analysis logic 104 and the report 107 may be stored on the storage device 108.
[0019] As mentioned above, the dimensions may be determined by an operator of the system 100. The dimensions may belong to a category including a business category or a technical category. The business category includes dimensions related to business-related factors that may enable or prevent the transfer of a computing resource to a cloud computing environment. The technical category includes dimensions related to the technical characteristics of the application or of the user. The operator of the system 100 may
predetermine the dimensions based on changes in cloud computing
environments, technology, and the like.
[0020] A "computing resource," as referred to herein, is any component used to carry out computation, communication, and the like. A computing resource may be data storage capacity, processing resources, software applications, and the like. The dimensions of either the technical category or the business category may include factors related to the characteristics of the computing resource.
[0021] Fig. 2 is a block diagram illustrating the analysis logic 1 04. The analysis logic 1 04 may include a data input module 202, a comparison engine 204, a weighting module 206, normalization module 208, a risk analysis module 210, and a reporting module 212.
[0022] The data input module 202 is configured to receive data, including the factors discussed above, related to the characteristics of the computing resource. In some embodiments, the data input module 202 may gather data via a graphical user interface of rendered on a display device, such as the display device 1 14 of Fig. 1 . The data may be gathered in the form of a questionnaire including questions associated the factors, as discussed below in regard to Figs. 3 and Figs. 4.
[0023] The comparison engine 204 is configured to compare the data received to an associated dimension to determine a comparison value. A comparison value may reflect how close the received data is to the dimensions. The comparison value may be a percentage. If the received data reflects that every factor of a given dimension has been met, the comparison value may be 100%, for example. In some cases, the comparison value may be less than 100% depending on how many of the questions for any given dimension are answered in the affirmative.
[0024] The comparison engine 204 may be configured to determine a type of computing environment for which the computing resource is most suitable based on how close the received data is to the dimensions. Determining the type of computing environment may include selecting the type from a group. The group of cloud computing environments may include a public cloud computing environment, a private off-premise cloud computing environment, a private on-premise cloud computing environment, and a dedicated computing environment. A public could computing environment, as referred to herein, is a cloud computing environment where the computing resources, such as applications, storage devices, and the like, are made available to the general public by a service provider. A private-off premise computing environment, as referred to herein, is a cloud computing environment is a cloud environment, located remotely from the geographic location of the user that is operated solely for a single organization or user. A private on-premise computing environment, as referred to herein, is a cloud computing environment located at the geographic location of the user. A dedicated computing environment, as referred to herein, is a computing environment that includes computing resources such as a server, which is leased, or owned, exclusively by a user of the computing resources.
[0025] The weighting module 206 is configured to weight the data received based on input from a user. For example, the data may include factors from a regulatory dimension of the business category. The weighting module 206 is configured to enable the user to weight some factors heavier than others. For example, the weighting module 206 may weight some regulatory dimensions factors that indicate issues with running an application on a public cloud computing environment heavier than factors that are related to whether the application may be more suitable to run on the private cloud computing environment or the dedicated computing environment.
[0026] The normalization module 208 is configured to normalize the comparison value based on a minimum value required for each dimension in relation to the type of cloud computing environment determined. A minimum value may be predetermined by an operator of the system 100. For example, the comparison value for the infrastructure dimension may be required to be at least 75% for a public cloud computing environment. In contrast, the comparison value for the cloud operating model may be required to be at least 90% for a public cloud computing environment. Therefore, in this example, a comparison value of 75% for the infrastructure dimension may be normalized with a comparison value of 90% for the cloud operating model dimension.
[0027] The risk analysis module 210 is configured to identify a risk value associated with the transferability of the application to the cloud computing environment. The risk value is identified based on a subset of values associated with the received data. The analysis logic 104 may direct the processor 106 to provide a risk mitigation recommendation based on the risk value. For example, each of the factors of the dimensions discussed above may be associated with a risk value indicating the risk for transferring a computing resource to a cloud computing environment. The risk values associated with each factor may be provided in the generated report. In some embodiments, the risk values may be averaged and associated with an average risk value of low, medium, high. In some embodiments, the generated report may also include recommendations related to mitigation of the risk indicated by the risk value.
[0028] The reporting module 212 is configured to generate a report based on the data received. The generated report may include diagrams and textual explanation related to the transferability of a computing resource to a cloud computing environment. In some embodiments, the report generated may include spider diagrams, as illustrated below in Figs. 5 to 7. The report generated may also include a recommendation for a type of computing environment for which transfer of the computing resource is suitable.
[0029] Fig. 3 is a dimension table 300 illustrating business dimensions 302 including factors 304 related to characteristics of the computing resource. The dimensions 302 in the dimension table 300 are dimensions of a business category 306. The dimensions of the business category 306 may include regulatory 308, vendor support 310, geography 312, service availability 314, workload variability 31 6, and security 318. Each of the business category 306 dimensions 302 includes factors 304 related to whether the user's business is compatible for transferring computing resources to the cloud computing environment.
[0030] The regulatory dimension 308 includes factors 304 related to whether there are regulatory issues that may prevent a computing resource from being executed in a cloud computing environment. For example, the factors 304 of the regulatory dimension may include whether an application is subject to regulatory requirements such as FISMA, HIPPA, and the like, or other regulations that may require the application to run on a government certified operating system image. Computing resources that are identified as having regulatory factors that are prohibitive to running on a public cloud computing environment may be more suitable for a private cloud computing environment or a dedicated computing environment.
[0031] The vendor support dimension 31 0 includes the factors 304 related to whether a vendor of any of a computing resource supports an instance of the computer resource in the cloud computing environment. For example, an application may be required to operate on a vendor certified operating system image.
[0032] The geography dimension 312 includes the factors 304 related to whether there are any issues relating to geography that prevent a computing resource from transferring to a cloud computing environment. For example, the geographic location of a user base may be a factor of the geography dimension when determining the transferability of a computing resource to the cloud computing environment.
[0033] The service availability dimension 314 includes the factors 304 related to whether a computing resource has a required service level, has an ability to automatically restart upon failure. For example, if a computing resource, such as an application, has an inability to automatically restart upon failure, the application may be best suited for a private cloud computing environment that may enable a user to restart the application.
[0034] The workload variability dimension 316 includes factors 304 related to whether the user's workload variability is well-suited for a cloud computing environment. For example, there may be unpredictable workloads associated with the computing resource. Unpredictable workloads, including peaks of usage may be a factor in the functionality of the computing resource in a cloud computing environment.
[0035] The security dimension 318 includes the factors 304 related to whether the computing resources include security restraints. For example, if a computing resource, such as an application, has security restraints that prohibit the use of the computing resource in a public cloud computing environment, the application may be best suited for a private cloud computing environment. As another example, an application may require a certain level of encryption not available in a public cloud computing environment.
[0036] Fig. 4 is a dimension table 400 illustrating technical dimensions 402 including factors 404_related to characteristics of the computing resource. The dimensions 402 in the dimension table 400 are dimensions of a technical category 406. The dimensions of the technical category 406 may include infrastructure compatibility 408, cloud computing model 41 0, internet stability 41 2, performance 414, architecture 416, and interfaces 41 8.
[0037] The infrastructure compatibility dimension 408 includes the factors 404 related to whether the computing resources are compatible with an infrastructure of a cloud computing environment. For example, the factors of the infrastructure compatibility dimension may include, for example, licensing restrictions, physical hardware dependencies, legacy operating system dependencies, and the like.
[0038] The cloud computing model dimension 41 0 includes the factors 404 related to whether the computing resources are compatible with a cloud computing environment. For example, the factors 404 of the cloud computing model dimension 41 0 may include whether the computing resource, such as an application, requires any customization of a cloud computing operating system to support the application. As another example, the factors 404 of the cloud computing model dimension 410 may include whether the computing resource, such as an application, utilizes proprietary clustering technology.
[0039] The internet stability dimension 412 includes the factors 404 related to whether the computing resources are suitable for a cloud computing
environment. For example, the factors 404 of the internet stability dimension 412 may include whether the level of performance of standard internet connectivity is sufficient for an application, or whether the application uses standard internet protocols. As another example, the factors 404 of the internet stability dimension 412 may include the level of reliability that may be required for an application, or whether the level of security associated with standard internet connectivity, such as HTTPS, will be sufficient for an application.
[0040] The performance dimension 414 includes the factors 404 related to whether the computing resources are compatible in terms of bandwidth and latency. For example, the factors 404 of the performance dimension may include a required data bandwidth associated with a computing resource, or an acceptable level of data latency.
[0041] The architecture dimension 41 6 includes the factors 404 related to whether the computing resources are suitable for a cloud computing
environment. For example, the factors 404 of the architecture dimension 416 may include whether a computing resource benefits from parallel processing, the communication architecture, whether the computing resource can scale horizontally or vertically, whether the computing resource is considered contextual or core, and the like. Other examples of the factors 404 of the architecture dimension 416 may include whether a computing resource, such as an application, relies on any services or components that are written in legacy software technologies or languages and whether the application is based on modern software technologies and languages.
[0042] The interfaces dimension 41 8 includes the factors 404 related to whether the computing resources have any issues that would prevent the computing resources to be transferred to a cloud computing environment. For example, the factors 404 of the interfaces dimension 418 may include whether the computing resource has related communication, data, and interface protocols that are well defined and documented.
[0043] Data describing the characteristics of the computing resource may be received for each of the factors 404. In some embodiments, the data may be received via a questionnaire filled in by the user. The questionnaire may be displayed on a graphical user interface of a display device, such as the display device 1 14 of Fig. 1 . The data may be received by analysis logic, such as the analysis logic 1 04 of Fig. 1 , and the analysis logic may carry out the operations as described above including determining how close the received data is to the dimensions of each category, and generating a report describing the analysis performed by the analysis logic 1 04.
[0044] Fig. 5 is a diagram 500 illustrating layers that relate to types of computing environments. As illustrated, the diagram 500 may include vertices 502, 504, 506, 508, 51 0, and 512, wherein each vertex may be associated with a dimension of either the business category or the technical category. The diagram 500 may include layers 514, 516, 518, 520, wherein a layer may be associated with a type of computing environment. The layer 514 may be associated with the dedicated computing environment. The layer 51 6 may be associated with the private on-premise cloud computing environment. The layer 51 8 may be associated with the private off-premise computing environment. The layer 520 may be associated with a public cloud computing environment.
[0045] Fig. 6 is a diagram 600 illustrating how close the received data along each business dimension is to a computing environment layer. As discussed above in reference to Fig. 1 , the business category includes six dimensions: regulatory 308, vendor support 310, geography 312, service availability 314, workload variability 31 6, and security 318. An area, as indicated by 602, may be associated with the characteristics of the application for which the data is received. The extent to which the area 602 covers a particular layer of the diagram 600 indicates the transferability of the corresponding computing resource to the particular type of computing system represented by the layer. The diagram 600 illustrates the data received indicates a close-fit in relation to the regulatory dimension 308, the vendor support dimension 31 0, the geography dimension 312, and the security dimension 318 for a public cloud computing environment associated with the layer 520. The diagram 600 also illustrates a poor fit for a private off-premise cloud computing environment associated with the layer 518, for the service availability dimension 314 and the workload variability dimension 316. Additionally, although not shown on the diagram 600, the data received in this example illustrates that the data received indicates a good fit for all dimensions of the business category including the private on-premise cloud computing environment, and the dedicated computing environment, respectively associated with the layers 516 and 514 of Fig. 5.
[0046] Fig. 7 is a diagram 700 illustrating how close the received data along each technical dimension is to a computing environment layer. As discussed above in reference to Fig 4, the technical category 406 includes six dimensions: infrastructure compatibility 408, cloud operating model 410, internet suitability 41 2, performance 414, architecture 416, and interfaces 41 8. An area, as indicated by 602, may be associated with the characteristics of the application for which the data is received. The diagram 700 illustrates the data received indicates a close-fit for some of the dimensions as the area 602 fills some of the dimensions of the diagram 700. For example, the diagram 700 illustrates the data received indicates a close-fit in relation to the infrastructure compatibility dimension 408 and the interfaces dimension 418 for a public cloud computing environment associated with the layer 520. The diagram 700 also illustrates a poor fit for a private off-premise cloud computing environment associated with the layer 518, for the performance dimension 414 and the architecture dimension 416. Additionally, although not shown on the diagram 600, the data received in this example illustrates that the data received indicates a good fit for all dimensions of the technical category including the private on-premise cloud computing environment, and the dedicated computing environment, respectively associated with the layers 516 and 514 of Fig. 5.
[0047] Fig. 8 is a block diagram illustrating a method 800 for generating a report related to the transferability of a computing resource to a cloud computing environment. The method 800 may include receiving, at block 802, data related to characteristics of the application. The method 800 may include comparing, at block 804, via a processor, the data received to predetermined dimensions related to the transferability of the computing resource to a cloud computing environment to determine a comparison value indicating how close the data is to each dimension. The method 800 may include generating, at block 806, via the processor, a report based on the comparison.
[0048] In some embodiments, the dimensions comprise factors related to the characteristics of the application. For example, one of the dimensions may be related to the security requirements of the application. One factor of the security dimension may be whether the application requires data encryption.
[0049] In some embodiments, the data received may be weighted. In this embodiment, the method 800 may include weighting the data received based on input from a user.
[0050] In some embodiments, generating the report, at block 808, may include determining a type of computing environment for which transfer of an application is suitable. In this embodiment, determining the type of computing environment includes selecting the type from a group. The group may include a public cloud computing environment, a private off-premise cloud computing environment, a private on-premise cloud computing environment; and a dedicated computing environment.
[0051] In some embodiments, the method 800 may include normalizing the comparison value based on a minimum value required for each dimension in relation to the type of cloud computing environment determined. For example, the comparison value for the infrastructure dimension may be required to be at least 75% for a public cloud computing environment. In contrast, the
comparison value for the cloud operating model may be required to be at least 90% for a public cloud computing environment. Therefore, the method 800 may include normalizing the data based on the minimum values.
[0052] In some embodiments, the method 800 may include determining categories including at least some of the dimensions, the categories including a business category comprising dimensions related to business characteristics of a user. The method 800 may include determining categories including at least some of the dimensions, the categories including a technical category comprising dimensions related to the technical characteristics of the application or of a user.
[0053] In some embodiments, the method 800 may include transferring the application to the cloud based on the report. In this embodiment, transferring the application to the cloud computing environment may include installing servers to host the application.
[0054] In some embodiments, the method 800 may include identifying a risk value associated with the transferability of the application to the cloud computing environment, wherein the risk value is identified based on a subset of values associated with the factors. In this embodiment, the method 800 may include providing a risk mitigation recommendation in the report generated based on the risk value.
[0055] Fig. 9 is a block diagram showing a tangible, non-transitory, computer-readable medium that stores code adapted to determine the transferability of a computing resource to a cloud computing environment. The computer-readable medium is generally referred to by the reference number 900. The computer-readable medium 900 can comprise Random Access Memory (RAM), a hard disk drive, an array of hard disk drives, an optical drive, an array of optical drives, a non-volatile memory, a Universal Serial Bus (USB) flash drive, a DVD, a CD, and the like. In one embodiment of the present invention, the computer-readable medium 900 can be accessed by a processor 902 over a computer bus 904.
[0056] The various software components discussed herein can be stored on the tangible, non-transitory computer-readable medium 900 as indicated in Fig. 9. For example, a first block 906 can include a data input module to receive data related to the characteristics of the computing resource. A second block 908 can include a comparison engine configured to compare the data received to a predetermined dimension related to the transferability of an application to a cloud computing environment to determine a comparison value. A third block 91 0 can include a weighting module configured to weight the data received based on input from a user. A fourth block 912 can include a normalization module 208 configured to normalize the comparison value based on a minimum value required for each dimension in relation to the type of cloud computing environment determined. A fifth block 914 can include a risk analysis module 21 0 is configured to identify a risk value associated with the transferability of the application to the cloud computing environment. A sixth block 91 6 can include a reporting module configured to generate a report based on the data received.
[0057] Although shown as contiguous blocks, the software components can be stored in any order or configuration. For example, if the computer-readable medium 400 is a hard drive, the software components can be stored in noncontiguous, or even overlapping, sectors.
[0058] What has been described and illustrated herein is a preferred embodiment of the invention along with some of its variations. The terms, descriptions and figures used herein are set from by way of illustration only and are not meant as limitations. Those skilled in the art will recognize that many variations are possible within the scope of the invention, which is intended to be defined by the following claims - and there equivalents - in which all terms are meant in their broadest reasonable sense unless otherwise indicated.

Claims

CLAIMS What is claimed is:
1 . A system, comprising:
a processor; and
a non-transitory computer-readable medium, comprising instructions that, when executed by the processor, direct the processor to:
receive data related to characteristics of a computing resource; compare the data received to predetermined dimensions related to the transferability of the computing resource to a cloud computing environment to determine a comparison value indicating how close the data is to each dimension; and generate a report based on the comparison.
2. The system of claim 1 , wherein generating the report comprises determining a type of computing environment for which transfer of the computing resource is suitable.
3. The system of claim 2, wherein determining the type of computing environment comprises selecting the type from a group comprising:
a public cloud computing environment;
a private off-premise cloud computing environment;
a private on-premise cloud computing environment; and
a dedicated computing environment.
4. The system of claim 3, the instructions direct the processor normalize the comparison value based on a minimum value required for each dimension in relation to the type of cloud computing environment determined.
5. The system of claim 1 , the instructions direct the processor to: identify a risk value associated with the transferability of the application to the cloud computing environment, wherein the risk value is identified based on a subset of values associated with the factors; and
provide a risk mitigation recommendation based on the risk value.
6. The system of claim 1 , wherein the dimensions comprise factors related to the characteristics of the computing resource.
7. A method, comprising:
receiving data related to characteristics of an application;
comparing, via a processor, the data received to predetermined
dimensions related to the transferability of the computing resource to a cloud computing environment to determine a comparison value indicating how close the data is to each dimension; and generating, via the processor, a report based on the comparison.
8. The method of claim 7, wherein generating the report comprises determining a type of computing environment for which transfer of the application is suitable.
9. The method of claim 8, wherein determining the type of computing environment comprises selecting the type from a group comprising:
a public cloud computing environment;
a private off-premise cloud computing environment;
a private on-premise cloud computing environment; and
a dedicated computing environment.
10. The method of claim 7, comprising transferring the application to the cloud computing environment based on the report, comprising instantiating servers to host the application.
1 1 . The method of claim 7, comprising:
identifying a risk value associated with the transferability of the
application to the cloud computing environment, wherein the risk value is identified based on a subset of values associated with the factors; and
providing a risk mitigation recommendation based on the risk value.
12. The method of claim 7, wherein the dimensions comprise factors related to the characteristics of the application.
13. A tangible, non-transitory, computer-readable medium, comprising code to direct a processor to:
receive data related to characteristics of an application;
compare the data received to predetermined dimensions related to the transferability of the computing resource to a cloud computing environment to determine a comparison value indicating how close the data is to each dimension; and
generate a report based on the comparison.
14. The tangible, non-transitory, computer-readable medium of claim 13, wherein the dimensions comprise factors related to the characteristics of the application.
15. The tangible, non-transitory, computer-readable medium of claim 13, comprising code to direct the processor to determine a type of computing environment for which transfer of the application is suitable, wherein
determining the type of computing environment comprises selecting the type from a group comprising:
a public cloud computing environment;
a private off-premise cloud computing environment;
a private on-premise cloud computing environment; and
a dedicated computing environment.
PCT/US2013/024200 2013-01-31 2013-01-31 Determining transferability of a computing resource to a cloud computing environment WO2014120218A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US14/764,973 US10728322B2 (en) 2013-01-31 2013-01-31 Determining transferability of a computing resource to a cloud computing environment
JP2015555978A JP6214679B2 (en) 2013-01-31 2013-01-31 Determining the mobility of computing resources into a cloud computing environment
CN201380074165.7A CN105229598B (en) 2013-01-31 2013-01-31 Determine computing resource to cloud computing environment portability
PCT/US2013/024200 WO2014120218A1 (en) 2013-01-31 2013-01-31 Determining transferability of a computing resource to a cloud computing environment
EP13873960.2A EP2951679A4 (en) 2013-01-31 2013-01-31 Determining transferability of a computing resource to a cloud computing environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2013/024200 WO2014120218A1 (en) 2013-01-31 2013-01-31 Determining transferability of a computing resource to a cloud computing environment

Publications (1)

Publication Number Publication Date
WO2014120218A1 true WO2014120218A1 (en) 2014-08-07

Family

ID=51262782

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/024200 WO2014120218A1 (en) 2013-01-31 2013-01-31 Determining transferability of a computing resource to a cloud computing environment

Country Status (5)

Country Link
US (1) US10728322B2 (en)
EP (1) EP2951679A4 (en)
JP (1) JP6214679B2 (en)
CN (1) CN105229598B (en)
WO (1) WO2014120218A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108139933A (en) * 2015-10-20 2018-06-08 微软技术许可有限责任公司 Physics and virtual telephony mobility

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10075537B2 (en) * 2015-08-27 2018-09-11 Accenture Global Services Limited Action execution architecture for virtual machines
GB201604070D0 (en) * 2016-03-09 2016-04-20 Ibm On-premise and off-premise communication
JP6668467B2 (en) * 2016-06-03 2020-03-18 株式会社日立製作所 Management system and resource scheduling method
US10594770B2 (en) 2016-11-01 2020-03-17 International Business Machines Corporation On-premises and off-premises communication
US11012506B2 (en) * 2019-03-15 2021-05-18 Microsoft Technology Licensing, Llc Node and cluster management on distributed self-governed ecosystem
US11237881B2 (en) * 2019-09-17 2022-02-01 Kyndryl, Inc. Message connector as a service to migrate streaming applications into cloud nativity
KR102202048B1 (en) * 2019-09-27 2021-01-12 국방과학연구소 Device for recommending cloud system based on legacy environment analysis
KR102202044B1 (en) * 2019-09-27 2021-01-12 국방과학연구소 Device for recommending cloud system based on legacy environment analysis
KR102261841B1 (en) * 2019-09-27 2021-06-08 국방과학연구소 Device for recommending cloud system based on legacy environment analysis
KR102202051B1 (en) * 2019-09-27 2021-01-12 국방과학연구소 Device for recommending cloud system based on legacy environment analysis
JP6960491B2 (en) * 2020-03-04 2021-11-05 株式会社日立製作所 Management system and infrastructure system management method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080201414A1 (en) * 2007-02-15 2008-08-21 Amir Husain Syed M Transferring a Virtual Machine from a Remote Server Computer for Local Execution by a Client Computer
US20120254640A1 (en) * 2011-03-28 2012-10-04 International Business Machines Corporation Allocation of storage resources in a networked computing environment based on energy utilization
US20120291140A1 (en) * 2009-06-26 2012-11-15 Arnaud Robert Method and System for Allocating Access to Digital Media Content
US8363806B2 (en) * 2002-11-07 2013-01-29 Blake Bookstaff Method and system for alphanumeric indexing for advertising via cloud computing
WO2013025196A1 (en) * 2011-08-15 2013-02-21 Empire Technology Development Llc Multimodal computing device

Family Cites Families (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0620116A (en) * 1992-07-03 1994-01-28 Olympus Optical Co Ltd Information card system
US6785691B1 (en) * 1999-10-13 2004-08-31 Avaya Technology Corp. Object oriented processing system and data sharing environment for applications therein
JP3933882B2 (en) * 2001-03-30 2007-06-20 富士通株式会社 Program for displaying radar chart and radar chart display method
WO2003048982A1 (en) 2001-12-04 2003-06-12 Emma Carolyn Taylor Webnotize transformation application
US7268782B2 (en) * 2003-10-31 2007-09-11 Sap Aktiengesellschaft Smart radar chart
US7757214B1 (en) * 2005-11-10 2010-07-13 Symantec Operating Coporation Automated concurrency configuration of multi-threaded programs
US7987262B2 (en) * 2008-11-19 2011-07-26 Accenture Global Services Limited Cloud computing assessment tool
US9709965B2 (en) * 2008-12-04 2017-07-18 Baselayer Technology, Llc Data center intelligent control and optimization
US7975165B2 (en) * 2009-06-25 2011-07-05 Vmware, Inc. Management of information technology risk using virtual infrastructures
US20110126197A1 (en) * 2009-11-25 2011-05-26 Novell, Inc. System and method for controlling cloud and virtualized data centers in an intelligent workload management system
US20110296025A1 (en) * 2010-03-30 2011-12-01 Jason Lieblich Systems and methods for facilitating migration and adoption of an alternative computing infrastructure
US9116731B2 (en) 2010-04-07 2015-08-25 Accenture Global Services Limited Cloud reference model framework
US8504689B2 (en) * 2010-05-28 2013-08-06 Red Hat, Inc. Methods and systems for cloud deployment analysis featuring relative cloud resource importance
US8731991B2 (en) * 2010-06-25 2014-05-20 King Abdulaziz City For Science And Technology System and method of information technology application deployment
US8478879B2 (en) * 2010-07-13 2013-07-02 International Business Machines Corporation Optimizing it infrastructure configuration
EP2603853A4 (en) 2010-08-12 2015-01-07 Unisys Corp Moving enterprise software applications to a cloud domain
US20120054731A1 (en) * 2010-08-24 2012-03-01 International Business Machines Corporation Method, System and Computer Programs to Assist Migration to a Cloud Computing Environment
US8612577B2 (en) * 2010-11-23 2013-12-17 Red Hat, Inc. Systems and methods for migrating software modules into one or more clouds
US9736252B2 (en) * 2010-11-23 2017-08-15 Red Hat, Inc. Migrating subscribed services in a cloud deployment
US9176742B2 (en) 2010-12-27 2015-11-03 Microsoft Technology Licensing, Llc Converting desktop applications to web applications
US8572623B2 (en) * 2011-01-11 2013-10-29 International Business Machines Corporation Determining an optimal computing environment for running an image based on performance of similar images
US10678602B2 (en) * 2011-02-09 2020-06-09 Cisco Technology, Inc. Apparatus, systems and methods for dynamic adaptive metrics based application deployment on distributed infrastructures
US9104672B2 (en) * 2011-02-25 2015-08-11 International Business Machines Corporation Virtual security zones for data processing environments
CN102833289B (en) * 2011-06-16 2016-02-17 浙江速腾电子有限公司 A kind of distributed cloud computing resources tissue and method for allocating tasks
US9098608B2 (en) * 2011-10-28 2015-08-04 Elwha Llc Processor configured to allocate resources using an entitlement vector
US20130124714A1 (en) * 2011-11-11 2013-05-16 Vmware, Inc. Visualization of combined performance metrics
US10083246B2 (en) * 2012-04-16 2018-09-25 Alcatel Lucent Apparatus and method for universal personal data portability
CN102857548B (en) * 2012-04-25 2016-06-08 梁宏斌 A kind of mobile cloud computing resources distributes method rationally
WO2013184133A1 (en) * 2012-06-08 2013-12-12 Hewlett-Packard Development Company, L.P. Cloud application deployment portability
US8972956B2 (en) * 2012-08-02 2015-03-03 International Business Machines Corporation Application deployment in heterogeneous environments
WO2014041761A1 (en) * 2012-09-13 2014-03-20 日本電気株式会社 Risk analysis device, risk analysis method and program
US20140122577A1 (en) * 2012-10-26 2014-05-01 Syntel, Inc. System and method for evaluating readiness of applications for the cloud
US9124498B2 (en) * 2013-02-14 2015-09-01 Xerox Corporation System and method for identifying optimal cloud configuration in black-box environments to achieve target throughput with best price based on performance capability benchmarking
US9813318B2 (en) * 2013-03-15 2017-11-07 International Business Machines Corporation Assessment of best fit cloud deployment infrastructures
US20140280964A1 (en) * 2013-03-15 2014-09-18 Gravitant, Inc. Systems, methods and computer readable mediums for implementing cloud service brokerage platform functionalities
US9608931B2 (en) * 2013-05-28 2017-03-28 Accenture Global Services Limited Migration assessment for cloud computing platforms
IN2013MU01951A (en) * 2013-06-05 2015-05-29 Tata Consultancy Services Ltd
US9858060B2 (en) * 2014-05-09 2018-01-02 International Business Machines Corporation Automated deployment of a private modular cloud-computing environment
US9703811B2 (en) * 2014-06-14 2017-07-11 Accenture Global Services Limited Assessing database migrations to cloud computing systems
US10255081B2 (en) * 2015-07-17 2019-04-09 Accenture Global Solutions Limited Method and system for intelligent cloud planning and decommissioning

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8363806B2 (en) * 2002-11-07 2013-01-29 Blake Bookstaff Method and system for alphanumeric indexing for advertising via cloud computing
US20080201414A1 (en) * 2007-02-15 2008-08-21 Amir Husain Syed M Transferring a Virtual Machine from a Remote Server Computer for Local Execution by a Client Computer
US20120291140A1 (en) * 2009-06-26 2012-11-15 Arnaud Robert Method and System for Allocating Access to Digital Media Content
US20120254640A1 (en) * 2011-03-28 2012-10-04 International Business Machines Corporation Allocation of storage resources in a networked computing environment based on energy utilization
WO2013025196A1 (en) * 2011-08-15 2013-02-21 Empire Technology Development Llc Multimodal computing device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2951679A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108139933A (en) * 2015-10-20 2018-06-08 微软技术许可有限责任公司 Physics and virtual telephony mobility
CN108139933B (en) * 2015-10-20 2021-12-07 微软技术许可有限责任公司 Method, apparatus, system, and medium for optimizing physical and virtual phone mobility

Also Published As

Publication number Publication date
EP2951679A1 (en) 2015-12-09
US10728322B2 (en) 2020-07-28
CN105229598A (en) 2016-01-06
CN105229598B (en) 2019-06-18
JP6214679B2 (en) 2017-10-18
JP2016511877A (en) 2016-04-21
EP2951679A4 (en) 2016-08-10
US20150373103A1 (en) 2015-12-24

Similar Documents

Publication Publication Date Title
US10728322B2 (en) Determining transferability of a computing resource to a cloud computing environment
US10032208B2 (en) Identifying recommended electronic books with detailed comparisons
US9503549B2 (en) Real-time data analysis for resource provisioning among systems in a networked computing environment
US10210054B1 (en) Backup optimization in hybrid storage environment
US8843621B2 (en) Event prediction and preemptive action identification in a networked computing environment
CN104424013A (en) Method and device for deploying virtual machine in computing environment
CN103379114A (en) Method and device for protecting private data in MapReduce system
CN102368224A (en) Processing method and device for hardware detection
US9225662B2 (en) Command management in a networked computing environment
US10169705B2 (en) System, method, and recording medium for geofence filtering
US20170235716A1 (en) Context driven artifact service management
US11610002B2 (en) Data privacy awareness in workload provisioning
US20220207448A1 (en) Method and System for Selection of Users in Feature Rollout
US20190272294A1 (en) Preventing biased queries by using a dictionary of cause and effect terms
US10885565B1 (en) Network-based data discovery and consumption coordination service
US9880786B1 (en) Multi-tiered elastic block device performance
US10567524B2 (en) Dynamic cognitive optimization of web applications
US11507469B2 (en) Method and system for risk score based asset data protection using a conformal framework
US11645136B2 (en) Capturing referenced information in a report to resolve a computer problem
US11954231B2 (en) Recursively adapting a sensitive content masking technique
US20220138287A1 (en) Published content protection
US20230409959A1 (en) Grouped aggregation in federated learning
US20220229921A1 (en) Timing for user data erasure requests

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201380074165.7

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13873960

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 14764973

Country of ref document: US

ENP Entry into the national phase

Ref document number: 2015555978

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2013873960

Country of ref document: EP